The proliferation of computing artifacts into the physical world promises more than spontaneous availability of computational resources to end users; it suggests new paradigms of interaction inspired by constant access to information and computational resources. The ongoing compactness of computing facilities into small mobile devices like portables, handheld or wearable computers will enhance a ubiquitous information processing. The basic paradigm of such a pervasive computing environment is the utilization of distributed computing power through devices that allow spontaneous connectivity. Computers will become invisible to the users and exchange of information between devices will effectively defy users control. The new security and privacy risks introduced by such environments need to be reduced by exploiting appropriate security measures and safeguards, ensuring an acceptable level of overall residual hazard.
The objectives of the SecPerU 2005 Workshop are to develop new security, privacy and trust concepts for complex application scenarios based on systems like handhelds, phones, and smart cards with the emerging technology of ubiquitous and pervasive computing.